Chapter 6 Audit in An Automated Environment
Chapter 6 Audit in An Automated Environment
AUDIT IN AN AUTOMATED
ENVIRONMENT
LEARNING OUTCOMES
After studing this chapter, you will be able to:
Understand the meaning of an Automated environment.
Understand the relevance of IT in an audit.
Learn how to perform an understanding of an Automated environment and
documenting the same.
Identify the various risks in Automated environment and the corresponding
controls.
Think about how banking transactions are carried out using ATMs (Automated Teller
Machines), or how tickets can be purchased using “apps” on mobile phones, etc. In
these examples, you can see how these computer systems enable us to transact
business at any time and any day.
Similarly, there are several other aspects that an auditor should consider to
determine the level of automation and complexity of a business environment which
we will look at in the following sections.
SAP ECC 6.0, Accounting, Texas, USA Client/Server, Paymaster Package CIO, Yes
EHPS Supply chain, Unix AIX 5.3, MS- d Administrator
Production SQL s
Server 2008
♦ First, we may not be able to rely on the data obtained from systems where
such risks exist. This means, all forms of data, information or reports that we
obtain from systems for the purpose of audit has to be thoroughly tested and
corroborated for completeness and accuracy.
♦ Second, we will not be able to rely on automated controls, calculations,
accounting procedures that are built into the applications. Additional audit
work may be required in this case.
♦ Third, due to the regulatory requirement of auditors to report on internal
financial controls of a company, the audit report also may have to be modified
in some instances.
In all the above scenarios, it is likely that the auditor will be required to obtain more
audit evidence and perform additional audit work. The auditor should also be able
to demonstrate how the risks were identified and what audit evidence was obtained
and validated to address these IT risks.
Here, we should remember that as the complexity, automation and dependence of
business operations on IT systems increases, the severity and impact of IT risks too
increases accordingly. The auditor should apply professional judgement in
determining and assessing such risks and plan the audit response appropriately.
To mitigate the above (and more) risks and maintain the confidentiality, integrity,
These are IT controls generally implemented to mitigate the IT specific risks and
applied commonly across multiple IT systems, applications and business processes.
Hence, General IT controls are known as “pervasive” controls or “indirect” controls.
Let us now learn about each of the General IT controls in more detail.
Program Change
Objective: To ensure that modified systems continue to meet financial reporting
objectives.
Activities:
♦ Change Management Process – definition, roles & responsibilities
♦ Change Requests – record, manage, track
♦ Making Changes – analyze, design, develop
♦ Test Changes – test plan, test cases, UAT
♦ Apply Changes in Production
♦ Emergency & Minor Changes
♦ Documentation – user/technical manuals
♦ User Training
Access Security
Objective:To ensure that access to programs and data is authenticated and authorized
to meet financial reporting objectives.
Activities:
♦ Security Organization & Management
♦ Security Policies & Procedures
♦ Application Security
♦ Data Security
♦ Operating System Security
♦ Network Security – internal network, perimeter network
♦ Physical Security – access controls, environment controls
♦ System Administration & Privileged Accounts – Sysadmins, DBAs, Super users
Examples of automated applications include edit checks and validation of input data,
sequence number checks, user limit checks, reasonableness checks, mandatory data
fields.
3.3.3 IT dependent Controls
IT dependent controls are basically manual controls that make use of some form of
data or information or report produced from IT systems and applications. In this
case, even though the control is performed manually, the design and effectiveness
of such controls depends on the reliability of source data.
Due to the inherent dependency on IT, the effectiveness and reliability of
Automated application controls and IT dependent controls require the General IT
Controls to be effective.
3.3.4 General IT Controls vs. Application Controls
♦ These two categories of control over IT systems are interrelated.
♦ The relationship between the application controls and the General IT Controls
is such that General IT Controls are needed to support the functioning of
application controls, and both are needed to ensure complete and accurate
information processing through IT systems.
4. TESTING METHODS
Having learnt about the various IT risks and controls, let us understand the different
ways testing is performed in an automated environment. There are basically four
types of audit tests that should be used. They are inquiry, observation, inspection
and reperformance. As shown in the illustration below, inquiry is the most efficient
audit test but it is also gives the least audit evidence. Hence, inquiry should always
be used in combination with any one of the other audit testing methods. Inquiry
alone is not sufficient.
Reperformance is most effective as an audit test
and gives the best audit evidence. However, testing
by reperformance could be very time consuming
and least efficient most of the time.
Generally, applying inquiry in combination with
inspection gives the most effective and efficient
audit evidence. However, which audit test to use,
when and in what combination is a matter of
professional judgement and will vary depending on several factors including risk
♦ Inspect the system logs to determine any changes made since last audit
testing.
Example
For example, refer below screenshot for the last modified date of depreciation
calculation program in PeopleSoft application
Example
Refer below the screenshot of a query in MS Access for extraction of journal entries for
above rupees 5 crores.
To rely on the system and application based information including data, reports,
automated controls, configurations, calculations and IT dependent it is essential to
first determine the existence and effectiveness of General IT Controls [ref para 3.3
above]. Where the general IT controls are not existing or existing but ineffective,
the auditor should assess the impact of IT risks and complexity of the automated
environment in which the business operations take place and plan alternative
audit procedures in order to rely on the system based information [ref para 3.2
above].
A suggested approach to benefit from the use of CAATs is given in the illustration
below:
The auditor needs to assess each finding or exception to determine impact on the
audit and evaluate if the exception results in a deficiency in internal control. Refer
to the flowchart to learn how this assessment should be carried out. This approach
and thought process is the same when auditing in an automated environment or
when auditing in a more manual environment.
GLOSSARY
Applications These are computer software programs that provide a
medium for recording, storage and retrieval of business
operations or transactions in electronic format.
Audit evidence This is the data, information, reports that an auditor obtains
during audit and forms the basis for an audit opinion.
Automated A task or activity that is routinely performed by a computer
system and does not require manual effort.
CAATs Short form for Computer Assisted Audit Techniques, are a
collection of computer based tools and techniques that are
used in an audit for analysing data in electronic form to
obtain audit evidence.
ABBREVIATION
IS Information System
ATM Automated Teller Machine
SA Standards on Auditing
CIO Chief Information Officer
CISO Chief Information Security Officer
ELC Entity Level Controls
FSLI Financial Statement Line Item
GITC General Information Technology Controls
IPE Information Produced by Entity
FSA Financial Statement Assertion
RCM Risk & Control Matrix
NTE Nature, Timing & Extent
ICM Internal Controls Memorandum
SOD Segregation of Duties
ERM Enterprise Risk Management
COSO Committee of Sponsoring Organisations
CAATS Computer Assisted Auditing Techniques
ACL Audit Command Language (CAAT Tool)
ISO International Organization for Standardization
IFC Internal Financial Controls
SUMMARY
An automated environment basically refers to a business environment where the
processes, operations, accounting and even decisions are carried out by using
computer systems – also known as Information Systems (IS) or Information
Technology (IT) systems.
The fundamental principle of an automated environment is the ability carry out
business with less manual intervention and more system driven. The complexity of
a business environment depends on the level of automation.As the complexity,
automation and dependence of business operations on IT systems increases, the
severity and impact of IT risks too increases accordingly.
The auditor should apply professional judgement in determining and assessing
such risks and plan the audit response appropriately. To mitigate the above (and
more) risks and maintain the confidentiality, integrity, availability and security of
data, companies implement IT controls.
Three types of controls in automated environment are (i)General IT Controls (ii)
ANSWERS/SOLUTIONS
Answers to MCQs
1. (c) 2. (d) 3. (b) 4. (a) 5. (d)
Answers to Correct/Incorrect
(i) Incorrect: The complexity of an automated environment depends on various
factors including the nature of business, level of automation, volume of
transactions, use of ERP and so on. There could be environment where
dependence on IT and automation is relatively less or minimal and hence,
considered less complex or even non-complex.
(ii) Incorrect. The auditor should plan response to those IT risks that are relevant
to financial reporting and not “all” IT risks.
(iii) Correct. General IT controls support the functioning of automated
application controls and IT dependent controls.
(iv) Correct. Inquiry is the most efficient but least effective. Moreover, testing
through inquiry alone is not sufficient. Inquiry should be corroborated by
applying any one or a combination of observation, inspection or
reperformance.
(v) Incorrect. Even though specialised audit tools are very useful, such tools are
not always required or necessary to carry out data analytics. More commonly
available spreadsheet applications like MS-Excel can also be effectively used
for carrying out data analytics.
Answers to Theoretical Questions
1. The auditor should consider relevance of IT in an audit of financial statements
for the following reasons:
(a) Since auditors rely on the reports and information generated by IT
systems, there could be risk in the IT systems that could have an impact
on audit.
(b) Standards on auditing SA 315 and SA 330 require auditors to
understand, assess and respond to risks that arise from the use of IT
systems.
(c) By relying on automated controls and using data analytics in an audit,
it is possible to increase the effectiveness and efficiency of the audit
process.
2. When risks in IT systems are not mitigated the audit impact could be as
follows:
(i) The auditor may not be able rely on the reports, data obtained,
automated controls, calculations and accounting procedures in the IT
system.
(ii) The auditor has to perform additional audit work by spending more time
and efforts.
(iii) The auditor may have to issue a modified opinion, if necessary.
3. When auditing in an automated environment, the following testing methods
are used:
(a) Inquiry
(b) Observation
(c) Inspection
(d) Reperformance
A combination of inquiry and inspection is generally the most effective and
efficient testing method. However, determining the most effective and
efficient testing method is a matter of professional judgement and depends on
the several factors including risk assessment, control environment, desired
level of evidence required, history of errors /misstatements, complexity of
business, assertions being addressed.